PC'fied gssapi directories. Mostly changing Makefile.in and adding the
authorKeith Vetter <keithv@fusion.com>
Tue, 21 Feb 1995 05:57:26 +0000 (05:57 +0000)
committerKeith Vetter <keithv@fusion.com>
Tue, 21 Feb 1995 05:57:26 +0000 (05:57 +0000)
windows INTERFACE keyword to functions. A few int/long fixes.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@4959 dc483132-0cff-0310-8789-dd5450dbe970

49 files changed:
src/lib/gssapi/ChangeLog
src/lib/gssapi/Makefile.in
src/lib/gssapi/generic/ChangeLog
src/lib/gssapi/generic/Makefile.in
src/lib/gssapi/generic/disp_com_err_status.c
src/lib/gssapi/generic/disp_major_status.c
src/lib/gssapi/generic/gssapi.h
src/lib/gssapi/generic/gssapiP_generic.h
src/lib/gssapi/generic/rel_buffer.c
src/lib/gssapi/generic/rel_oid_set.c
src/lib/gssapi/generic/util_buffer.c
src/lib/gssapi/generic/util_canonhost.c
src/lib/gssapi/generic/util_dup.c
src/lib/gssapi/generic/util_oid.c
src/lib/gssapi/generic/util_token.c
src/lib/gssapi/generic/util_validate.c
src/lib/gssapi/generic/utl_nohash_validate.c
src/lib/gssapi/krb5/ChangeLog
src/lib/gssapi/krb5/Makefile.in
src/lib/gssapi/krb5/accept_sec_context.c
src/lib/gssapi/krb5/acquire_cred.c
src/lib/gssapi/krb5/compare_name.c
src/lib/gssapi/krb5/context_time.c
src/lib/gssapi/krb5/delete_sec_context.c
src/lib/gssapi/krb5/disp_name.c
src/lib/gssapi/krb5/disp_status.c
src/lib/gssapi/krb5/get_tkt_flags.c
src/lib/gssapi/krb5/gssapiP_krb5.h
src/lib/gssapi/krb5/gssapi_krb5.c
src/lib/gssapi/krb5/gssapi_krb5.h
src/lib/gssapi/krb5/import_name.c
src/lib/gssapi/krb5/indicate_mechs.c
src/lib/gssapi/krb5/init_sec_context.c
src/lib/gssapi/krb5/inq_context.c
src/lib/gssapi/krb5/inq_cred.c
src/lib/gssapi/krb5/k5seal.c
src/lib/gssapi/krb5/k5unseal.c
src/lib/gssapi/krb5/krb5_gss_glue.c
src/lib/gssapi/krb5/process_context_token.c
src/lib/gssapi/krb5/rel_cred.c
src/lib/gssapi/krb5/rel_name.c
src/lib/gssapi/krb5/seal.c
src/lib/gssapi/krb5/sign.c
src/lib/gssapi/krb5/unseal.c
src/lib/gssapi/krb5/util_cksum.c
src/lib/gssapi/krb5/util_crypt.c
src/lib/gssapi/krb5/util_seed.c
src/lib/gssapi/krb5/util_seqnum.c
src/lib/gssapi/krb5/verify.c

index 77257b5e7dadda3dd53470fd947eaf59d72b8366..2bd94d756f8a9eb2b23b9363dad3397e39e62921 100644 (file)
@@ -1,3 +1,7 @@
+Mon Feb 20 21:38:20 1995 Keith Vetter (keithv@fusion.com)
+
+       * Makefile.in: made to work on the PC
+
 Fri Nov 18 00:17:29 1994  Mark Eichin  <eichin@cygnus.com>
 
        * configure.in: move WITH_CCOPTS.
index c053508fca964bc752df688ed5274435acfc4fbd..06c4091136f8686fbf9fd13e79c74446d004a7fd 100644 (file)
@@ -1,6 +1,12 @@
 TST=if test -n "`cat DONE`" ; then
 
-all::
+##DOSBUILDTOP = ..\..
+##DOSLIBNAME=libgssapi_krb5.$(LIBEXT)
+##DOS!include $(BUILDTOP)\config\windows.in
+
+all:: all-$(WHAT)
+
+all-unix::
 
 libgssapi_krb5.a: generic/DONE krb5/DONE
        (cd generic; $(TST) $(ARADD) ../$@ `cat DONE` ; fi)
@@ -11,5 +17,27 @@ install:: libgssapi_krb5.a
        $(INSTALL_DATA) libgssapi_krb5.a $(DESTDIR)$(KRB5_LIBDIR)/libgssapi_krb5.a
        $(RANLIB) $(DESTDIR)$(KRB5_LIBDIR)/libgssapi_krb5.a
 
-clean::
-       $(RM) libgssapi_krb5.a
+clean:: clean-$(WHAT)
+       $(RM) libgssapi_krb5.$(LIBEXT) libgssapi_krb5.bak
+
+clean-unix::
+
+all-windows::
+       cd generic
+       @echo Making in ..\generic
+       -$(MAKE) -$(MFLAGS) LIB=$(LIB)
+       cd ..\krb5
+       @echo Making in krb5
+       -$(MAKE) -$(MFLAGS) LIB=$(LIB)
+       cd ..
+
+clean-windows::
+       cd generic
+       @echo Making clean in ..\generic
+       -$(MAKE) -$(MFLAGS) clean
+       cd ..\krb5
+       @echo Making clean in krb5
+       -$(MAKE) -$(MFLAGS) clean
+       cd ..
+
+
index a1d1298d7882442062c6a999bd05d0f7656c4460..69d5aebd6e0ba1138222e4a77f9147fb01b0af2e 100644 (file)
@@ -1,3 +1,17 @@
+Mon Feb 20 18:50:33 1995 Keith Vetter (keithv@fusion.com)
+
+       * Makefile.in: made to work on the PC
+        * Added windows INTERFACE keyword
+          disp_com.c disp_maj.c rel_buff.c rel_oid_.c
+          util_buf.c util_can.c util_dup.c util_oid.c
+          util_tok.c util_val.c utl_noha.c
+        * gssapiP_generic.h: 
+          added INTERFACE keyword
+          removed inclusion
+        * util_tok.c: had to coerce long to int on TWRITE_STR.
+        * gssapi.h: made typedef for OM_uint32 machine independent and
+          added INTERFACE to prototypes.
+
 Mon Feb 20 12:00:00 1994  Keith Vetter (keithv@fusion.com)
 
        More DOS 8.3 renames--for files created by make
index 251a9ac073f734862b39e90c11e7585ba1616305..182c307e985d5b1c58046c4f9ab713b470d15931 100644 (file)
@@ -1,13 +1,18 @@
 CFLAGS = $(CCOPTS) $(DEFS) -I. -I$(srcdir)
 LDFLAGS = -g
 
+##DOSBUILDTOP = ..\..\..
+##DOSLIBNAME=..\libgssapi_krb5.$(LIBEXT)
+##DOSsrcdir = .
+##DOS!include $(BUILDTOP)\config\windows.in
+
 all:: $(OBJS)
 
 ETSRCS= gssapi_err_generic.c
-ETOBJS= gssapi_err_generic.o
+ETOBJS= gssapi_err_generic.$(OBJEXT)
 ETHDRS= gssapi_err_generic.h
 
-gssapi_err_generic.o: gssapi_err_generic.c
+gssapi_err_generic.$(OBJEXT): gssapi_err_generic.c
 
 gssapi_err_generic.h: gssapi_err_generic.et
 
@@ -15,10 +20,10 @@ gssapi_err_generic.c: gssapi_err_generic.et
 
 #if HasHashLibrary
 # UTIL_VALIDATE_SRC= $(srcdir)/util_validate.c
-# UTIL_VALIDATE_OBJ= util_validate.o
+# UTIL_VALIDATE_OBJ= util_validate.$(OBJEXT)
 #else
 UTIL_VALIDATE_SRC= $(srcdir)/utl_nohash_validate.c
-UTIL_VALIDATE_OBJ= utl_nohash_validate.o
+UTIL_VALIDATE_OBJ= utl_nohash_validate.$(OBJEXT)
 #endif
 
 CCSRCS = \
@@ -35,31 +40,46 @@ CCSRCS = \
        $(UTIL_VALIDATE_SRC)
 
 CCOBJS = \
-       disp_major_status.o \
-       disp_com_err_status.o \
-       gssapi_generic.o \
-       rel_buffer.o \
-       rel_oid_set.o \
-       util_buffer.o \
-       util_canonhost.o \
-       util_dup.o \
-       util_oid.o \
-       util_token.o \
+       disp_major_status.$(OBJEXT) \
+       disp_com_err_status.$(OBJEXT) \
+       gssapi_generic.$(OBJEXT) \
+       rel_buffer.$(OBJEXT) \
+       rel_oid_set.$(OBJEXT) \
+       util_buffer.$(OBJEXT) \
+       util_canonhost.$(OBJEXT) \
+       util_dup.$(OBJEXT) \
+       util_oid.$(OBJEXT) \
+       util_token.$(OBJEXT) \
        $(UTIL_VALIDATE_OBJ)
 
 
-EHDRDIR= $(BUILDTOP)/include/gssapi
+EHDRDIR= $(BUILDTOP)$(S)include$(S)gssapi
 EXPORTED_HEADERS= gssapi.h gssapi_generic.h
 
 SRCS= $(ETSRCS) $(CCSRCS)
 OBJS= $(ETOBJS) $(CCOBJS)
 HDRS= $(ETHDRS)
 
-all:: $(SRCS) $(HDRS) includes $(OBJS)
+all:: all-$(WHAT) $(SRCS) $(HDRS) includes $(OBJS)
+
+all-unix::
+
+all-windows::
+       if not exist $(EHDRDIR)\nul mkdir $(EHDRDIR)
+       copy gssapi.h $(EHDRDIR)
+       copy gssapi_generic.h $(EHDRDIR)
 
-clean::
+clean:: clean-$(WHAT)
+
+clean-unix::
        $(RM) $(ETHDRS) $(ETSRCS)
 
+clean-windows::
+       $(RM) $(EHDRDIR)\gssapi.h $(EHDRDIR)\gssapi_generic.h
+       if exist $(EHDRDIR)\nul rmdir $(EHDRDIR)
+
 # Krb5InstallHeaders($(EXPORTED_HEADERS), $(KRB5_INCDIR)/krb5)
 
 depend:: $(ETSRCS)
+
+includes::
index f0e66c3bb939ba3d58dda801c5be2789b5f39d44..627891275ad139017b0d51be73d0d5f72d5d3b5c 100644 (file)
@@ -40,7 +40,8 @@ static const char * const no_error = "No error";
    if status_type == GSS_C_MECH_CODE, return the output from error_message()
    */
 
-OM_uint32 g_display_com_err_status(minor_status, status_value, status_string)
+OM_uint32 INTERFACE
+g_display_com_err_status(minor_status, status_value, status_string)
      OM_uint32 *minor_status;
      OM_uint32 status_value;
      gss_buffer_t status_string;
index 8bbf5953841c2de61f440237584c6beca4006999..d37b34e880635fc09fc03b3cc9c18b7baf468cea 100644 (file)
@@ -201,7 +201,7 @@ static OM_uint32 display_bit(minor_status, code, status_string)
      message_context > 2  : print supplementary info bit (message_context-2)
      */
 
-OM_uint32 g_display_major_status(minor_status, status_value, 
+OM_uint32 INTERFACE g_display_major_status(minor_status, status_value, 
                                 message_context, status_string)
      OM_uint32 *minor_status;
      OM_uint32 status_value;
index 29eefdf038ff774f66626b767f0e9ae7bea8afc1..edcef24a7224cac34a0e30562848686c267a3740 100644 (file)
@@ -36,7 +36,7 @@
 /*
  * First, define the platform-dependent types.
  */
-typedef unsigned int OM_uint32;
+typedef krb5_ui_4 OM_uint32;
 typedef void * gss_name_t;
 typedef void * gss_cred_id_t;
 typedef void * gss_ctx_id_t;
@@ -232,7 +232,7 @@ typedef struct gss_channel_bindings_struct {
  * Finally, function prototypes for the GSSAPI routines.
  */
 
-OM_uint32 gss_acquire_cred
+OM_uint32 INTERFACE gss_acquire_cred
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_name_t,       /* desired_name */
             OM_uint32,        /* time_req */
@@ -243,12 +243,12 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 gss_release_cred
+OM_uint32 INTERFACE gss_release_cred
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_cred_id_t*    /* cred_handle */
            ));
 
-OM_uint32 gss_init_sec_context
+OM_uint32 INTERFACE gss_init_sec_context
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_cred_id_t,    /* claimant_cred_handle */
             gss_ctx_id_t*,    /* context_handle */
@@ -265,7 +265,7 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 gss_accept_sec_context
+OM_uint32 INTERFACE gss_accept_sec_context
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t*,    /* context_handle */
             gss_cred_id_t,    /* verifier_cred_handle */
@@ -280,25 +280,25 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_cred_id_t*    /* delegated_cred_handle */
            ));
 
-OM_uint32 gss_process_context_token
+OM_uint32 INTERFACE gss_process_context_token
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             gss_buffer_t      /* token_buffer */
            ));
 
-OM_uint32 gss_delete_sec_context
+OM_uint32 INTERFACE gss_delete_sec_context
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t*,    /* context_handle */
             gss_buffer_t      /* output_token */
            ));
 
-OM_uint32 gss_context_time
+OM_uint32 INTERFACE gss_context_time
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 gss_sign
+OM_uint32 INTERFACE gss_sign
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             int,              /* qop_req */
@@ -306,7 +306,7 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t      /* message_token */
            ));
 
-OM_uint32 gss_verify
+OM_uint32 INTERFACE INTERFACE gss_verify
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             gss_buffer_t,     /* message_buffer */
@@ -314,7 +314,7 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             int*              /* qop_state */
            ));
 
-OM_uint32 gss_seal
+OM_uint32 INTERFACE gss_seal
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             int,              /* conf_req_flag */
@@ -324,7 +324,7 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t      /* output_message_buffer */
            ));
 
-OM_uint32 gss_unseal
+OM_uint32 INTERFACE gss_unseal
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             gss_buffer_t,     /* input_message_buffer */
@@ -333,7 +333,7 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             int*              /* qop_state */
            ));
 
-OM_uint32 gss_display_status
+OM_uint32 INTERFACE gss_display_status
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             OM_uint32,        /* status_value */
             int,              /* status_type */
@@ -342,48 +342,48 @@ PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t      /* status_string */
            ));
 
-OM_uint32 gss_indicate_mechs
+OM_uint32 INTERFACE gss_indicate_mechs
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_OID_set*      /* mech_set */
            ));
 
-OM_uint32 gss_compare_name
+OM_uint32 INTERFACE gss_compare_name
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_name_t,       /* name1 */
             gss_name_t,       /* name2 */
             int*              /* name_equal */
            ));
 
-OM_uint32 gss_display_name
+OM_uint32 INTERFACE gss_display_name
 PROTOTYPE( (OM_uint32*,      /* minor_status */
             gss_name_t,      /* input_name */
             gss_buffer_t,     /* output_name_buffer */
             gss_OID*         /* output_name_type */
            ));
 
-OM_uint32 gss_import_name
+OM_uint32 INTERFACE gss_import_name
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t,     /* input_name_buffer */
             const_gss_OID,    /* input_name_type */
             gss_name_t*       /* output_name */
            ));
 
-OM_uint32 gss_release_name
+OM_uint32 INTERFACE gss_release_name
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_name_t*       /* input_name */
            ));
 
-OM_uint32 gss_release_buffer
+OM_uint32 INTERFACE gss_release_buffer
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t      /* buffer */
            ));
 
-OM_uint32 gss_release_oid_set
+OM_uint32 INTERFACE gss_release_oid_set
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_OID_set*      /* set */
            ));
 
-OM_uint32 gss_inquire_cred
+OM_uint32 INTERFACE gss_inquire_cred
 PROTOTYPE( (OM_uint32 *,      /* minor_status */
             gss_cred_id_t,    /* cred_handle */
             gss_name_t *,     /* name */
@@ -392,7 +392,7 @@ PROTOTYPE( (OM_uint32 *,      /* minor_status */
             gss_OID_set *     /* mechanisms */
            ));
 
-OM_uint32 gss_inquire_context
+OM_uint32 INTERFACE gss_inquire_context
 PROTOTYPE( (OM_uint32*,       /* minor_status */
            gss_ctx_id_t,     /* context_handle */
            gss_name_t*,      /* initiator_name */
index 08ee040d1900a528b55d4486912e2145160457b0..54a25f78355d25ed6b34681f0d4f7120d6edc155 100644 (file)
 #include "gssapi_err_generic.h"
 #include <errno.h>
 #include <sys/types.h>
-#include <netinet/in.h>
 
 /** helper macros **/
 
 #define g_OID_equal(o1,o2) \
    (((o1)->length == (o2)->length) && \
-    (memcmp((o1)->elements,(o2)->elements,(o1)->length) == 0))
+    (memcmp((o1)->elements,(o2)->elements,(int) (o1)->length) == 0))
 
 /* this code knows that an int on the wire is 32 bits.  The type of
    num should be at least this big, or the extra shifts may do weird
 
 /** helper functions **/
 
-int g_save_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_save_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_save_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_save_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_save_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_save_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
 
-int g_validate_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_validate_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_validate_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_validate_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_validate_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_validate_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
 
-int g_delete_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_delete_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_delete_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_delete_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_delete_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_delete_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
 
-int g_make_string_buffer PROTOTYPE((const char *str, gss_buffer_t buffer));
+int INTERFACE g_make_string_buffer PROTOTYPE((const char *str, gss_buffer_t buffer));
 
-int g_copy_OID_set PROTOTYPE((const gss_OID_set_desc * const in, gss_OID_set *out));
+int INTERFACE g_copy_OID_set PROTOTYPE((const gss_OID_set_desc * const in, gss_OID_set *out));
 
-int g_token_size PROTOTYPE((const_gss_OID mech, unsigned int body_size));
+int INTERFACE g_token_size PROTOTYPE((const_gss_OID mech, unsigned int body_size));
 
-void g_make_token_header PROTOTYPE((const_gss_OID mech, int body_size,
+void INTERFACE g_make_token_header PROTOTYPE((const_gss_OID mech, int body_size,
                          unsigned char **buf, int tok_type));
 
-int g_verify_token_header PROTOTYPE((const_gss_OID mech, int *body_size,
+int INTERFACE g_verify_token_header PROTOTYPE((const_gss_OID mech, int *body_size,
                          unsigned char **buf, int tok_type, int toksize));
 
-OM_uint32 g_display_major_status PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE g_display_major_status PROTOTYPE((OM_uint32 *minor_status,
                                 OM_uint32 status_value,
                                 int *message_context,
                                 gss_buffer_t status_string));
 
-OM_uint32 g_display_com_err_status PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE INTERFACE g_display_com_err_status PROTOTYPE((OM_uint32 *minor_status,
                                   OM_uint32 status_value,
                                   gss_buffer_t status_string));
 
-char *g_canonicalize_host PROTOTYPE((char *hostname));
+char * INTERFACE g_canonicalize_host PROTOTYPE((char *hostname));
 
-char *g_strdup PROTOTYPE((char *str));
+char * INTERFACE g_strdup PROTOTYPE((char *str));
 
 /** declarations of internal name mechanism functions **/
 
-OM_uint32 generic_gss_release_buffer
+OM_uint32 INTERFACE generic_gss_release_buffer
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_buffer_t      /* buffer */
            ));
 
-OM_uint32 generic_gss_release_oid_set
+OM_uint32 INTERFACE generic_gss_release_oid_set
 PROTOTYPE( (OM_uint32*,       /* minor_status */
             gss_OID_set*      /* set */
            ));
index b764a5b5f2cc75a09dc637ff43f7fa39cca0e970..2345fc4b0dd64f33c550484487ea271aa939789b 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_generic.h"
 
-OM_uint32 generic_gss_release_buffer(minor_status, buffer)
+OM_uint32 INTERFACE generic_gss_release_buffer(minor_status, buffer)
      OM_uint32 *minor_status;
      gss_buffer_t buffer;
 {
index 2edfe9a39a4734855265d63bfb1cfd143999e4d2..073664a1927eab3947102f692504bb996b0d2c98 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_generic.h"
 
-OM_uint32 generic_gss_release_oid_set(minor_status, set)
+OM_uint32 INTERFACE generic_gss_release_oid_set(minor_status, set)
      OM_uint32 *minor_status;
      gss_OID_set *set;
 {
index cf144495f85cf2db7bf4a17b227b0f17778c8ebc..5fd06721c2f4a0ad30f6dcb5b6f2876a77b033dc 100644 (file)
@@ -27,7 +27,7 @@
    make sure that buffer is consistent (release'able) when this
    function exits, no matter what the exit value */
 
-int g_make_string_buffer(str, buffer)
+int INTERFACE g_make_string_buffer(str, buffer)
      const char *str;
      gss_buffer_t buffer;
 {
index 694d9335432e0bd85e7e5fbd75ab1b914a494f73..89de87a0289d5b7e6e78b1d72ab07fb27f00a2d8 100644 (file)
  */
 
 /* This file could be OS specific */
-
 #include "gssapiP_generic.h"
-
+#ifndef _MSDOS
 #include <sys/types.h>
 #include <sys/socket.h>
 #include <netdb.h>
 #include <ctype.h>
 
-char *g_canonicalize_host(hostname)
+char * INTERFACE
+g_canonicalize_host(hostname)
      char *hostname;
 {
    struct hostent *hent;
@@ -61,3 +61,4 @@ char *g_canonicalize_host(hostname)
 
    return(canon);
 }
+#endif
index 4e48d17041c1731f12f14cbd592d6e0ae93e8934..e3e3e52a6dfa1b1aba688d2b1dfe6649fe2479cd 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_generic.h"
 
-char *g_strdup(str)
+char * INTERFACE g_strdup(str)
      char *str;
 {
    char *ret;
index c415aad76fb5710ba8aad5bbbc5b9dab3f26ec2a..8f3d434eb657efacc38ba58c2985fcab323bfd66 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_generic.h"
 
-int
+int INTERFACE
 g_copy_OID_set(in, out)
      const gss_OID_set_desc * const in;
      gss_OID_set *out;
index 483126c5e5cd507da2291689dada48354f0adeaf..424125d5da8d271403edbec54deb38ac85d71fe3 100644 (file)
@@ -111,7 +111,7 @@ static int der_read_length(buf, bufsize)
 
 /* returns the length of a token, given the mech oid and the body size */
 
-int g_token_size(mech, body_size)
+int INTERFACE g_token_size(mech, body_size)
      const_gss_OID mech;
      unsigned int body_size;
 {
@@ -123,7 +123,7 @@ int g_token_size(mech, body_size)
 /* fills in a buffer with the token header.  The buffer is assumed to
    be the right size.  buf is advanced past the token header */
 
-void g_make_token_header(mech, body_size, buf, tok_type)
+void INTERFACE g_make_token_header(mech, body_size, buf, tok_type)
      const_gss_OID mech;
      int body_size;
      unsigned char **buf;
@@ -133,7 +133,7 @@ void g_make_token_header(mech, body_size, buf, tok_type)
    der_write_length(buf, 4 + mech->length + body_size);
    *(*buf)++ = 0x06;
    *(*buf)++ = (unsigned char) mech->length;
-   TWRITE_STR(*buf, mech->elements, mech->length);
+   TWRITE_STR(*buf, mech->elements, ((int) mech->length));
    *(*buf)++ = (unsigned char) ((tok_type>>8)&0xff);
    *(*buf)++ = (unsigned char) (tok_type&0xff);
 }
@@ -142,7 +142,7 @@ void g_make_token_header(mech, body_size, buf, tok_type)
    leaving buf advanced past the token header, and setting body_size
    to the number of remaining bytes */
 
-int g_verify_token_header(mech, body_size, buf, tok_type, toksize)
+int INTERFACE g_verify_token_header(mech, body_size, buf, tok_type, toksize)
      const_gss_OID mech;
      int *body_size;
      unsigned char **buf;
index 72631341ba2f9c33e5a6e25d7e77f8a7309bc7ac..e60ed427b0494c907625ebe686976bddd862b53b 100644 (file)
@@ -105,45 +105,45 @@ static int g_delete(DB **vdb, int type, void *ptr)
 
 /* save */
 
-int g_save_name(void **vdb, gss_name_t *name)
+int INTERFACE g_save_name(void **vdb, gss_name_t *name)
 {
    return(g_save((DB **) vdb, V_NAME, (void *) name));
 }
-int g_save_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_save_cred_id(void **vdb, gss_cred_id_t *cred)
 {
    return(g_save((DB **) vdb, V_CRED_ID, (void *) cred));
 }
-int g_save_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_save_ctx_id(void **vdb, gss_ctx_id_t *ctx)
 {
    return(g_save((DB **) vdb, V_CTX_ID, (void *) ctx));
 }
 
 /* validate */
 
-int g_validate_name(void **vdb, gss_name_t *name)
+int INTERFACE g_validate_name(void **vdb, gss_name_t *name)
 {
    return(g_validate((DB **) vdb, V_NAME, (void *) name));
 }
-int g_validate_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_validate_cred_id(void **vdb, gss_cred_id_t *cred)
 {
    return(g_validate((DB **) vdb, V_CRED_ID, (void *) cred));
 }
-int g_validate_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_validate_ctx_id(void **vdb, gss_ctx_id_t *ctx)
 {
    return(g_validate((DB **) vdb, V_CTX_ID, (void *) ctx));
 }
 
 /* delete */
 
-int g_delete_name(void **vdb, gss_name_t *name)
+int INTERFACE g_delete_name(void **vdb, gss_name_t *name)
 {
    return(g_delete((DB **) vdb, V_NAME, (void *) name));
 }
-int g_delete_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_delete_cred_id(void **vdb, gss_cred_id_t *cred)
 {
    return(g_delete((DB **) vdb, V_CRED_ID, (void *) cred));
 }
-int g_delete_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_delete_ctx_id(void **vdb, gss_ctx_id_t *ctx)
 {
    return(g_delete((DB **) vdb, V_CTX_ID, (void *) ctx));
 }
index d3c4191aabff53601787da02c1f1d928cccdf113..88ad5937cd3577dafe05e39b236b558761ce7fd6 100644 (file)
 #include "gssapiP_generic.h"
 
 #include <sys/types.h>
-#include <sys/file.h>
 #include <limits.h>
 
 /* functions for each type */
 
 /* save */
 
-int g_save_name(vdb, name)
+int INTERFACE g_save_name(vdb, name)
      void **vdb;
      gss_name_t *name;
 {
        return 1;
 }
-int g_save_cred_id(vdb, cred)
+int INTERFACE g_save_cred_id(vdb, cred)
      void **vdb;
      gss_cred_id_t *cred;
 {
        return 1;
 }
-int g_save_ctx_id(vdb, ctx)
+int INTERFACE g_save_ctx_id(vdb, ctx)
      void **vdb;
      gss_ctx_id_t *ctx;
 {
@@ -55,19 +54,19 @@ int g_save_ctx_id(vdb, ctx)
 
 /* validate */
 
-int g_validate_name(vdb, name)
+int INTERFACE g_validate_name(vdb, name)
      void **vdb;
      gss_name_t *name;
 {
        return 1;
 }
-int g_validate_cred_id(vdb, cred)
+int INTERFACE g_validate_cred_id(vdb, cred)
      void **vdb;
      gss_cred_id_t *cred;
 {
        return 1;
 }
-int g_validate_ctx_id(vdb, ctx)
+int INTERFACE g_validate_ctx_id(vdb, ctx)
      void **vdb;
      gss_ctx_id_t *ctx;
 {
@@ -76,19 +75,19 @@ int g_validate_ctx_id(vdb, ctx)
 
 /* delete */
 
-int g_delete_name(vdb, name)
+int INTERFACE g_delete_name(vdb, name)
      void **vdb;
      gss_name_t *name;
 {
        return 1;
 }
-int g_delete_cred_id(vdb, cred)
+int INTERFACE g_delete_cred_id(vdb, cred)
      void **vdb;
      gss_cred_id_t *cred;
 {
        return 1;
 }
-int g_delete_ctx_id(vdb, ctx)
+int INTERFACE g_delete_ctx_id(vdb, ctx)
      void **vdb;
      gss_ctx_id_t *ctx;
 {
index 67ac76dcdee33fcdda18f0e5e6d3c8b416b75754..f6038d90672905317cd7ddadbe45162d5b0dcfe4 100644 (file)
@@ -1,3 +1,11 @@
+Mon Feb 20 19:53:9 1995 Keith Vetter (keithv@fusion.com)
+
+       * accept_s.c: needed temp to avoid sign/unsigned mismatch on the PC.
+       * init_sec.c: needed temp to avoid sign/unsigned mismatch on the PC.
+        * gssapiP_krb5.h k5seal.c, k5unseal.c: removed netinet/in.h include.
+        * util_seq.c: changed int to 32bit int
+        * gssapiP_krb5.h, gssapi_krb5.h, *.c: added windows INTERFACE keyword
+
 Mon Feb 20 12:00:00 1995  keith Vetter (keithv@fusion.com)
 
        Rename files for DOS 8.3 uniqueness--files created by Make
index 3a3342b0c25384e8fc4b76bd831d68114d148966..eb3e9a01b92fc38a3ac522caa3b409880c8c052a 100644 (file)
@@ -1,13 +1,18 @@
 CFLAGS = $(CCOPTS) $(DEFS) -I. -I$(srcdir) -I../generic -I$(srcdir)/../generic
 LDFLAGS = -g
 
+##DOSBUILDTOP = ..\..\..
+##DOSLIBNAME=..\libgssapi_krb5.$(LIBEXT)
+##DOSsrcdir = .
+##DOS!include $(BUILDTOP)\config\windows.in
+
 all:: $(OBJS)
 
 ETSRCS= gssapi_err_krb5.c
-ETOBJS= gssapi_err_krb5.o
+ETOBJS= gssapi_err_krb5.$(OBJEXT)
 ETHDRS= gssapi_err_krb5.h
 
-gssapi_err_krb5.o: gssapi_err_krb5.c
+gssapi_err_krb5.$(OBJEXT): gssapi_err_krb5.c
 
 gssapi_err_krb5.h: gssapi_err_krb5.et
 
@@ -44,34 +49,34 @@ CCSRCS = \
        $(srcdir)/verify.c
 
 CCOBJS = \
-       accept_sec_context.o \
-       acquire_cred.o \
-       compare_name.o \
-       context_time.o \
-       delete_sec_context.o \
-       disp_name.o \
-       disp_status.o \
-       get_tkt_flags.o \
-       gssapi_krb5.o \
-       import_name.o \
-       indicate_mechs.o \
-       init_sec_context.o \
-       inq_context.o \
-       inq_cred.o \
-       k5seal.o \
-       k5unseal.o \
-       krb5_gss_glue.o \
-       process_context_token.o \
-       rel_cred.o \
-       rel_name.o \
-       seal.o \
-       sign.o \
-       unseal.o \
-       util_cksum.o \
-       util_crypt.o \
-       util_seed.o \
-       util_seqnum.o \
-       verify.o
+       accept_sec_context.$(OBJEXT) \
+       acquire_cred.$(OBJEXT) \
+       compare_name.$(OBJEXT) \
+       context_time.$(OBJEXT) \
+       delete_sec_context.$(OBJEXT) \
+       disp_name.$(OBJEXT) \
+       disp_status.$(OBJEXT) \
+       get_tkt_flags.$(OBJEXT) \
+       gssapi_krb5.$(OBJEXT) \
+       import_name.$(OBJEXT) \
+       indicate_mechs.$(OBJEXT) \
+       init_sec_context.$(OBJEXT) \
+       inq_context.$(OBJEXT) \
+       inq_cred.$(OBJEXT) \
+       k5seal.$(OBJEXT) \
+       k5unseal.$(OBJEXT) \
+       krb5_gss_glue.$(OBJEXT) \
+       process_context_token.$(OBJEXT) \
+       rel_cred.$(OBJEXT) \
+       rel_name.$(OBJEXT) \
+       seal.$(OBJEXT) \
+       sign.$(OBJEXT) \
+       unseal.$(OBJEXT) \
+       util_cksum.$(OBJEXT) \
+       util_crypt.$(OBJEXT) \
+       util_seed.$(OBJEXT) \
+       util_seqnum.$(OBJEXT) \
+       verify.$(OBJEXT)
 
 SRCS= $(ETSRCS) $(CCSRCS)
 OBJS= $(ETOBJS) $(CCOBJS)
@@ -81,9 +86,13 @@ EHDRDIR=$(TOP)/include/gssapi
 
 all:: $(SRCS) $(HDRS) includes $(OBJS)
 
-clean::
+clean:: clean-$(WHAT)
+
+clean-unix::
        $(RM) $(ETHDRS) $(ETSRCS)
 
+clean-windows::
+
 depend:: $(ETSRCS)
 
 includes:: 
index 81ef0fa8da37516df6c17558b411d90f2bc69f15..e394458990625b43271eb1e881f950d9566bf131 100644 (file)
@@ -108,7 +108,7 @@ make_ap_rep(context, authdat, subkey, seq_send, token)
    return(0);
 }
 
-OM_uint32 
+OM_uint32 INTERFACE
 krb5_gss_accept_sec_context(context, minor_status, context_handle, 
                            verifier_cred_handle, input_token,
                            input_chan_bindings, src_name, mech_type,
@@ -128,6 +128,7 @@ krb5_gss_accept_sec_context(context, minor_status, context_handle,
      gss_cred_id_t *delegated_cred_handle;
 {
    unsigned char *ptr, *ptr2;
+   char *sptr;
    long tmp;
    int bigend;
    krb5_gss_cred_id_t cred;
@@ -197,7 +198,8 @@ krb5_gss_accept_sec_context(context, minor_status, context_handle,
       return(GSS_S_DEFECTIVE_TOKEN);
    }
 
-   TREAD_STR(ptr, ap_req.data, ap_req.length);
+   sptr = (char *) ptr;
+   TREAD_STR(sptr, ap_req.data, ap_req.length);
 
    /* construct the sender_addr */
 
@@ -229,8 +231,8 @@ krb5_gss_accept_sec_context(context, minor_status, context_handle,
    /* decode the message */
 
    if (code = krb5_rd_req(context, &ap_req, cred->princ, paddr, NULL, 
-                         &rd_req_keyproc, (krb5_pointer) cred->keytab, 
-                         rcache, &authdat)) {
+                         (krb5_rdreq_key_proc) rd_req_keyproc,
+                          (krb5_pointer) cred->keytab, rcache, &authdat)) {
       (void) krb5_rc_close(context, rcache);
       *minor_status = code;
       return(GSS_S_FAILURE);
index 04db823f62d065f3998740840bf931339a8d36c4..19025b51b94e340d79abe2b902de8ec8b4099d4a 100644 (file)
@@ -232,7 +232,7 @@ acquire_init_cred(context, minor_status, desired_name, output_princ, cred)
 }
    
 /*ARGSUSED*/
-OM_uint32 
+OM_uint32 INTERFACE
 krb5_gss_acquire_cred(context, minor_status, desired_name, time_req,
                      desired_mechs, cred_usage, output_cred_handle,
                      actual_mechs, time_rec)
index 93275360038db0ab6f501b3ebe2475238d0ac8e9..c81c6c71de0b009446172a731661399d239e0d25 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_compare_name(context, minor_status, name1, name2, name_equal)
      krb5_context context;
      OM_uint32 *minor_status;
index 02989ee31713c46b12b3135f03215bbfcdcba5e6..aa76b4f82d47f7bdf356133679c94acc49ce9710 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_context_time(context, minor_status, context_handle, time_rec)
      krb5_context context;
      OM_uint32 *minor_status;
index 73bd9b05a30ba135838f8693b45bbdaa00d834b0..cf3ce419350b91da0736fd0baab4a3611698819e 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_delete_sec_context(context, minor_status, context_handle, output_token)
      krb5_context context;
      OM_uint32 *minor_status;
index badb61e18505be0417d3f3f7e207def87c4dd236..e6047c96e1c5e24efd04a9421cf32c1b9f1b28bc 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_display_name(context, minor_status, input_name, output_name_buffer, 
                      output_name_type)
      krb5_context context;
index 1cedfe5ced7fd3a71edac29b76d095c6d4268097..952df190b64d75d742d4c96d4e77d000089b133a 100644 (file)
@@ -31,7 +31,7 @@ static int init_et = 0;
 
 /**/
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_display_status(context, minor_status, status_value, status_type,
                        mech_type, message_context, status_string)
      krb5_context context;
index b04e0c1f25347898ffa20b47594e49eb5f5f2143..91360a8af467c83e51cf7f9083a58a1d616dfb71 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_krb5_get_tkt_flags(minor_status, context_handle, ticket_flags)
      OM_uint32 *minor_status;
      gss_ctx_id_t context_handle;
index df4dd047b7c590c5e5ccb0f3a1fc9b9b4eda8b79..86095e714772b312bdd7e705771c55f382dfdc22 100644 (file)
@@ -25,7 +25,6 @@
 
 #include <krb5/krb5.h>
 #include <memory.h>
-#include <netinet/in.h>
 
 /* work around sunos braindamage */
 #ifdef major
@@ -114,35 +113,38 @@ extern krb5_context kg_context;
 
 /** helper functions **/
 
-OM_uint32 kg_get_defcred 
+OM_uint32 INTERFACE kg_get_defcred 
        PROTOTYPE((OM_uint32 *minor_status, 
                   gss_cred_id_t *cred));
 
-OM_uint32 kg_release_defcred PROTOTYPE((OM_uint32 *minor_status));
+OM_uint32 INTERFACE kg_release_defcred PROTOTYPE((OM_uint32 *minor_status));
 
-krb5_error_code kg_checksum_channel_bindings PROTOTYPE((gss_channel_bindings_t cb,
+krb5_error_code INTERFACE kg_checksum_channel_bindings
+         PROTOTYPE((gss_channel_bindings_t cb,
                                             krb5_checksum *cksum,
                                             int bigend));
 
-krb5_error_code kg_make_seq_num PROTOTYPE((krb5_gss_enc_desc *ed, int direction,
-                               int seqnum, unsigned char *cksum,
+krb5_error_code INTERFACE kg_make_seq_num PROTOTYPE((krb5_gss_enc_desc *ed,
+            int direction, krb5_int32 seqnum, unsigned char *cksum,
                                unsigned char *buf));
 
-krb5_error_code kg_make_seed PROTOTYPE((krb5_keyblock *key, unsigned char *seed));
+krb5_error_code INTERFACE kg_make_seed PROTOTYPE((krb5_keyblock *key,
+            unsigned char *seed));
 
-int kg_confounder_size PROTOTYPE((krb5_gss_enc_desc *ed));
+int INTERFACE kg_confounder_size PROTOTYPE((krb5_gss_enc_desc *ed));
 
-krb5_error_code kg_make_confounder PROTOTYPE((krb5_gss_enc_desc *ed, unsigned char *buf));
+krb5_error_code INTERFACE kg_make_confounder PROTOTYPE((krb5_gss_enc_desc *ed,
+            unsigned char *buf));
 
-int kg_encrypt_size PROTOTYPE((krb5_gss_enc_desc *ed, int n));
+int INTERFACE kg_encrypt_size PROTOTYPE((krb5_gss_enc_desc *ed, int n));
 
-krb5_error_code kg_encrypt PROTOTYPE((krb5_gss_enc_desc *ed, krb5_pointer iv,
-                          krb5_pointer in, krb5_pointer out, int length));
+krb5_error_code INTERFACE kg_encrypt PROTOTYPE((krb5_gss_enc_desc *ed,
+            krb5_pointer iv, krb5_pointer in, krb5_pointer out, int length));
 
-krb5_error_code kg_decrypt PROTOTYPE((krb5_gss_enc_desc *ed, krb5_pointer iv,
-                          krb5_pointer in, krb5_pointer out, int length));
+krb5_error_code INTERFACE kg_decrypt PROTOTYPE((krb5_gss_enc_desc *ed, 
+                          krb5_pointer iv, krb5_pointer in, krb5_pointer out, int length));
 
-OM_uint32 kg_seal PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE kg_seal PROTOTYPE((OM_uint32 *minor_status,
                  gss_ctx_id_t context_handle,
                  int conf_req_flag,
                  int qop_req,
@@ -151,7 +153,7 @@ OM_uint32 kg_seal PROTOTYPE((OM_uint32 *minor_status,
                  gss_buffer_t output_message_buffer,
                  int toktype));
 
-OM_uint32 kg_unseal PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE kg_unseal PROTOTYPE((OM_uint32 *minor_status,
                    gss_ctx_id_t context_handle,
                    gss_buffer_t input_token_buffer,
                    gss_buffer_t message_buffer,
@@ -161,7 +163,7 @@ OM_uint32 kg_unseal PROTOTYPE((OM_uint32 *minor_status,
 
 /** declarations of internal name mechanism functions **/
 
-OM_uint32 krb5_gss_acquire_cred
+OM_uint32 INTERFACE krb5_gss_acquire_cred
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_name_t,       /* desired_name */
@@ -173,13 +175,13 @@ PROTOTYPE( (krb5_context,
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 krb5_gss_release_cred
+OM_uint32 INTERFACE krb5_gss_release_cred
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_cred_id_t*    /* cred_handle */
            ));
 
-OM_uint32 krb5_gss_init_sec_context
+OM_uint32 INTERFACE krb5_gss_init_sec_context
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_cred_id_t,    /* claimant_cred_handle */
@@ -197,7 +199,7 @@ PROTOTYPE( (krb5_context,
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 krb5_gss_accept_sec_context
+OM_uint32 INTERFACE krb5_gss_accept_sec_context
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t*,    /* context_handle */
@@ -213,28 +215,28 @@ PROTOTYPE( (krb5_context,
             gss_cred_id_t*    /* delegated_cred_handle */
            ));
 
-OM_uint32 krb5_gss_process_context_token
+OM_uint32 INTERFACE krb5_gss_process_context_token
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             gss_buffer_t      /* token_buffer */
            ));
 
-OM_uint32 krb5_gss_delete_sec_context
+OM_uint32 INTERFACE krb5_gss_delete_sec_context
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t*,    /* context_handle */
             gss_buffer_t      /* output_token */
            ));
 
-OM_uint32 krb5_gss_context_time
+OM_uint32 INTERFACE krb5_gss_context_time
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
             OM_uint32*        /* time_rec */
            ));
 
-OM_uint32 krb5_gss_sign
+OM_uint32 INTERFACE krb5_gss_sign
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
@@ -243,7 +245,7 @@ PROTOTYPE( (krb5_context,
             gss_buffer_t      /* message_token */
            ));
 
-OM_uint32 krb5_gss_verify
+OM_uint32 INTERFACE krb5_gss_verify
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
@@ -252,7 +254,7 @@ PROTOTYPE( (krb5_context,
             int*              /* qop_state */
            ));
 
-OM_uint32 krb5_gss_seal
+OM_uint32 INTERFACE krb5_gss_seal
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
@@ -263,7 +265,7 @@ PROTOTYPE( (krb5_context,
             gss_buffer_t      /* output_message_buffer */
            ));
 
-OM_uint32 krb5_gss_unseal
+OM_uint32 INTERFACE krb5_gss_unseal
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_ctx_id_t,     /* context_handle */
@@ -273,7 +275,7 @@ PROTOTYPE( (krb5_context,
             int*              /* qop_state */
            ));
 
-OM_uint32 krb5_gss_display_status
+OM_uint32 INTERFACE krb5_gss_display_status
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             OM_uint32,        /* status_value */
@@ -283,13 +285,13 @@ PROTOTYPE( (krb5_context,
             gss_buffer_t      /* status_string */
            ));
 
-OM_uint32 krb5_gss_indicate_mechs
+OM_uint32 INTERFACE krb5_gss_indicate_mechs
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_OID_set*      /* mech_set */
            ));
 
-OM_uint32 krb5_gss_compare_name
+OM_uint32 INTERFACE krb5_gss_compare_name
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_name_t,       /* name1 */
@@ -297,7 +299,7 @@ PROTOTYPE( (krb5_context,
             int*              /* name_equal */
            ));
 
-OM_uint32 krb5_gss_display_name
+OM_uint32 INTERFACE krb5_gss_display_name
 PROTOTYPE( (krb5_context,
            OM_uint32*,      /* minor_status */
             gss_name_t,      /* input_name */
@@ -305,7 +307,7 @@ PROTOTYPE( (krb5_context,
             gss_OID*         /* output_name_type */
            ));
 
-OM_uint32 krb5_gss_import_name
+OM_uint32 INTERFACE krb5_gss_import_name
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_buffer_t,     /* input_name_buffer */
@@ -313,13 +315,13 @@ PROTOTYPE( (krb5_context,
             gss_name_t*       /* output_name */
            ));
 
-OM_uint32 krb5_gss_release_name
+OM_uint32 INTERFACE krb5_gss_release_name
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
             gss_name_t*       /* input_name */
            ));
 
-OM_uint32 krb5_gss_inquire_cred
+OM_uint32 INTERFACE krb5_gss_inquire_cred
 PROTOTYPE( (krb5_context,
            OM_uint32 *,      /* minor_status */
             gss_cred_id_t,    /* cred_handle */
@@ -329,7 +331,7 @@ PROTOTYPE( (krb5_context,
             gss_OID_set *     /* mechanisms */
            ));
 
-OM_uint32 krb5_gss_inquire_context
+OM_uint32 INTERFACE krb5_gss_inquire_context
 PROTOTYPE( (krb5_context,
            OM_uint32*,       /* minor_status */
            gss_ctx_id_t,     /* context_handle */
@@ -341,6 +343,6 @@ PROTOTYPE( (krb5_context,
            int*              /* locally_initiated */
           ));
 
-OM_uint32 kg_get_context();
+OM_uint32 INTERFACE kg_get_context();
        
 #endif /* _GSSAPIP_KRB5_H_ */
index 4b23217fa575d8a733d9a53556835c21299f462b..9b318587f5f95fbc29c797c8dd4525f559e4a81e 100644 (file)
@@ -73,7 +73,7 @@ static gss_cred_id_t defcred = GSS_C_NO_CREDENTIAL;
 
 /* XXX what happens when the default credentials expire or are invalidated? */
 
-OM_uint32
+OM_uint32 INTERFACE
 kg_get_defcred(minor_status, cred)
      OM_uint32 *minor_status;
      gss_cred_id_t *cred;
@@ -99,7 +99,7 @@ kg_get_defcred(minor_status, cred)
    return(GSS_S_COMPLETE);
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 kg_release_defcred(minor_status)
      OM_uint32 *minor_status;
 {
@@ -114,7 +114,7 @@ kg_release_defcred(minor_status)
    return(krb5_gss_release_cred(kg_context, minor_status, &defcred));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 kg_get_context()
 {
        if (kg_context)
index 53f24758351674727d90917384f835e9c7321f07..cbbb00f9258a8f6ec89c5fec479316da9ff8a78a 100644 (file)
@@ -39,7 +39,7 @@ extern const gss_OID_desc * const gss_nt_krb5_principal;
 #define gss_krb5_nt_machine_uid_name   gss_nt_machine_uid_name
 #define gss_krb5_nt_string_uid_name    gss_nt_string_uid_name
 
-OM_uint32 gss_krb5_get_tkt_flags 
+OM_uint32 INTERFACE gss_krb5_get_tkt_flags 
        PROTOTYPE((OM_uint32 *minor_status,
                   gss_ctx_id_t context_handle,
                   krb5_flags *ticket_flags));
index 47417bb6613fe4b01374cbf70d2b33faa4f4f5ed..fbe50cc3e1ece4f99c7ebe8691c2fa751ace2566 100644 (file)
@@ -21,6 +21,7 @@
  */
 
 #include "gssapiP_krb5.h"
+#ifndef _MSDOS
 #include <pwd.h>
 #ifdef USE_STRING_H
 #include <string.h>
@@ -35,7 +36,7 @@
  * GSS_S_FAILURE       if memory allocation fails
  */
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_import_name(context, minor_status, input_name_buffer, 
                     input_name_type, output_name)
      krb5_context context;
@@ -146,3 +147,4 @@ krb5_gss_import_name(context, minor_status, input_name_buffer,
    *output_name = (gss_name_t) princ;
    return(GSS_S_COMPLETE);
 }
+#endif
index f100873450deab8ada3783c15ac0872df3c13481..11d94131bb3b98f1ecaef3bf3d0eebda1f7891fd 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_indicate_mechs(context, minor_status, mech_set)
      krb5_context context;
      OM_uint32 *minor_status;
index 37fa6b2186200fc3539a9342a1c74a93607ee1c8..5b42687d061e1cc9864368a29df9443f63b8c850 100644 (file)
@@ -129,7 +129,7 @@ make_ap_req(context, cred, server, endtime, chan_bindings, do_mutual,
    return(0);
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_init_sec_context(context, minor_status, claimant_cred_handle,
                        context_handle, target_name, mech_type,
                        req_flags, time_req, input_chan_bindings,
@@ -337,6 +337,7 @@ krb5_gss_init_sec_context(context, minor_status, claimant_cred_handle,
       }
    } else {
       unsigned char *ptr;
+      char *sptr;
       krb5_data ap_rep;
       krb5_ap_rep_enc_part *ap_rep_data;
 
@@ -387,7 +388,8 @@ krb5_gss_init_sec_context(context, minor_status, claimant_cred_handle,
         return(GSS_S_DEFECTIVE_TOKEN);
       }
 
-      TREAD_STR(ptr, ap_rep.data, ap_rep.length);
+      sptr = (char *) ptr;                      /* PC compiler bug */
+      TREAD_STR(sptr, ap_rep.data, ap_rep.length);
 
       /* decode the ap_rep */
       if (code = krb5_rd_rep(context, &ap_rep, ctx->subkey, &ap_rep_data)) {
index 3fd7abefaf559b869c2564db06ce4b75e47e4d8f..b7a8507ccf33ebd9a2b9fe3b5374ff786559b270 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_inquire_context(context, minor_status, context_handle, initiator_name, 
                         acceptor_name, lifetime_rec, mech_type, ret_flags,
                         locally_initiated)
index 1101e14cbcf7e11d3a4ec0fbe394935478f468f3..7aee2632ccc434abf633bd6f823b1370fb44e0da 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_inquire_cred(context, minor_status, cred_handle, name, lifetime_ret,
                      cred_usage, mechanisms)
      krb5_context context;
index da431f1e247be8bb5970b44eaf704ff6adae77ff..d475b010ad469b6ef51e42ee1bcc9991fa8ee7b2 100644 (file)
@@ -21,7 +21,6 @@
  */
 
 #include "gssapiP_krb5.h"
-#include <netinet/in.h>
 #include <krb5/rsa-md5.h>
 
 static krb5_error_code
@@ -180,7 +179,7 @@ make_seal_token(context, enc_ed, seq_ed, seqnum, direction, text, token,
 /* if signonly is true, ignore conf_req, conf_state, 
    and do not encode the ENC_TYPE, MSG_LENGTH, or MSG_TEXT fields */
 
-OM_uint32
+OM_uint32 INTERFACE
 kg_seal(minor_status, context_handle, conf_req_flag, qop_req, 
        input_message_buffer, conf_state, output_message_buffer, toktype)
      OM_uint32 *minor_status;
index ca0eca182575c918af648b9d7e27562670647a0d..ce0bde5242b91dc87156a9beb0df8f0ae1dd9351 100644 (file)
 
 #include "gssapiP_krb5.h"
 #include <memory.h>
-#include <netinet/in.h>
 #include <krb5/rsa-md5.h>
 
 /* message_buffer is an input if SIGN, output if SEAL, and ignored if DEL_CTX
    conf_state is only valid if SEAL.
    */
 
-OM_uint32
+OM_uint32 INTERFACE
 kg_unseal(minor_status, context_handle, input_token_buffer, message_buffer,
          conf_state, qop_state, toktype)
      OM_uint32 *minor_status;
index c8907e1bc116f25a7c0557099af2329a029a6f5f..a449b79d8e69b3c20cef572bedc54fb5ffab8dba 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_accept_sec_context(minor_status, context_handle, verifier_cred_handle,
                       input_token, input_chan_bindings, src_name, mech_type, 
                       output_token, ret_flags, time_rec, delegated_cred_handle)
@@ -64,7 +64,7 @@ gss_accept_sec_context(minor_status, context_handle, verifier_cred_handle,
                                      delegated_cred_handle));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_acquire_cred(minor_status, desired_name, time_req, desired_mechs,
                 cred_usage, output_cred_handle, actual_mechs, time_rec)
      OM_uint32 *minor_status;
@@ -89,7 +89,7 @@ gss_acquire_cred(minor_status, desired_name, time_req, desired_mechs,
                                time_rec));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_compare_name(minor_status, name1, name2, name_equal)
      OM_uint32 *minor_status;
      gss_name_t name1;
@@ -103,7 +103,7 @@ gss_compare_name(minor_status, name1, name2, name_equal)
                                name2, name_equal));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_context_time(minor_status, context_handle, time_rec)
      OM_uint32 *minor_status;
      gss_ctx_id_t context_handle;
@@ -123,7 +123,7 @@ gss_context_time(minor_status, context_handle, time_rec)
                                time_rec));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_delete_sec_context(minor_status, context_handle, output_token)
      OM_uint32 *minor_status;
      gss_ctx_id_t *context_handle;
@@ -143,7 +143,7 @@ gss_delete_sec_context(minor_status, context_handle, output_token)
                                      context_handle, output_token));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_display_name(minor_status, input_name, output_name_buffer, output_name_type)
      OM_uint32 *minor_status;
      gss_name_t input_name;
@@ -157,7 +157,7 @@ gss_display_name(minor_status, input_name, output_name_buffer, output_name_type)
                                output_name_buffer, output_name_type));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_display_status(minor_status, status_value, status_type,
                   mech_type, message_context, status_string)
      OM_uint32 *minor_status;
@@ -175,7 +175,7 @@ gss_display_status(minor_status, status_value, status_type,
                                  status_string));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_import_name(minor_status, input_name_buffer, input_name_type, output_name)
      OM_uint32 *minor_status;
      gss_buffer_t input_name_buffer;
@@ -189,7 +189,7 @@ gss_import_name(minor_status, input_name_buffer, input_name_type, output_name)
                               input_name_type, output_name));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_indicate_mechs(minor_status, mech_set)
      OM_uint32 *minor_status;
      gss_OID_set *mech_set;
@@ -200,7 +200,7 @@ gss_indicate_mechs(minor_status, mech_set)
    return(krb5_gss_indicate_mechs(kg_context, minor_status, mech_set));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_init_sec_context(minor_status, claimant_cred_handle, context_handle,
                     target_name, mech_type, req_flags, time_req,
                     input_chan_bindings, input_token, actual_mech_type,
@@ -230,7 +230,7 @@ gss_init_sec_context(minor_status, claimant_cred_handle, context_handle,
                                    time_rec));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_inquire_context(minor_status, context_handle, initiator_name, acceptor_name,
                    lifetime_rec, mech_type, ret_flags,
                    locally_initiated)
@@ -258,7 +258,7 @@ gss_inquire_context(minor_status, context_handle, initiator_name, acceptor_name,
                                   mech_type, ret_flags, locally_initiated));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_inquire_cred(minor_status, cred_handle, name, lifetime_ret,
                 cred_usage, mechanisms)
      OM_uint32 *minor_status;
@@ -275,7 +275,7 @@ gss_inquire_cred(minor_status, cred_handle, name, lifetime_ret,
                                name, lifetime_ret, cred_usage, mechanisms));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_process_context_token(minor_status, context_handle, token_buffer)
      OM_uint32 *minor_status;
      gss_ctx_id_t context_handle;
@@ -295,7 +295,7 @@ gss_process_context_token(minor_status, context_handle, token_buffer)
                                         context_handle, token_buffer));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_release_cred(minor_status, cred_handle)
      OM_uint32 *minor_status;
      gss_cred_id_t *cred_handle;
@@ -306,7 +306,7 @@ gss_release_cred(minor_status, cred_handle)
    return(krb5_gss_release_cred(kg_context, minor_status, cred_handle));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_release_name(minor_status, input_name)
      OM_uint32 *minor_status;
      gss_name_t *input_name;
@@ -317,7 +317,7 @@ gss_release_name(minor_status, input_name)
    return(krb5_gss_release_name(kg_context, minor_status, input_name));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_release_buffer(minor_status, buffer)
      OM_uint32 *minor_status;
      gss_buffer_t buffer;
@@ -326,7 +326,7 @@ gss_release_buffer(minor_status, buffer)
                                     buffer));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_release_oid_set(minor_status, set)
      OM_uint32* minor_status;
      gss_OID_set *set;
@@ -334,7 +334,7 @@ gss_release_oid_set(minor_status, set)
    return(generic_gss_release_oid_set(minor_status, set));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_seal(minor_status, context_handle, conf_req_flag, qop_req,
         input_message_buffer, conf_state, output_message_buffer)
      OM_uint32 *minor_status;
@@ -360,7 +360,7 @@ gss_seal(minor_status, context_handle, conf_req_flag, qop_req,
                        conf_state, output_message_buffer));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_sign(minor_status, context_handle, qop_req, message_buffer, message_token)
      OM_uint32 *minor_status;
      gss_ctx_id_t context_handle;
@@ -382,7 +382,7 @@ gss_sign(minor_status, context_handle, qop_req, message_buffer, message_token)
                        qop_req, message_buffer, message_token));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_unseal(minor_status, context_handle, input_message_buffer,
           output_message_buffer, conf_state, qop_state)
      OM_uint32 *minor_status;
@@ -407,7 +407,7 @@ gss_unseal(minor_status, context_handle, input_message_buffer,
                          conf_state, qop_state));
 }
 
-OM_uint32
+OM_uint32 INTERFACE
 gss_verify(minor_status, context_handle, message_buffer,
           token_buffer, qop_state)
      OM_uint32 *minor_status;
index 5a7a65215244d5ace5b80df2206224af85eafbd7..3a6d404f0d518f20c3373050a6a3561144a5d8ca 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_process_context_token(context, minor_status, context_handle, 
                               token_buffer)
      krb5_context context;
index 21cfc5fba298db305df46ca4bd19c4c5288ad944..28f1ff7b46f5b3f296772bc2945fe350ca1957ac 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE 
 krb5_gss_release_cred(context, minor_status, cred_handle)
      krb5_context context;
      OM_uint32 *minor_status;
index 4756d08bd5e200f1b1cf62e6573874b225c17166..fd0a88ebc40af349009ed13986606983fad7d4b7 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_release_name(context, minor_status, input_name)
      krb5_context context;
      OM_uint32 *minor_status;
index a0e06ebdee179976820351c1f31957b7124fa19b..645b3d63856dc77d476f0b2421ed83e750e947d0 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_seal(context, minor_status, context_handle, conf_req_flag,
              qop_req, input_message_buffer, conf_state,
              output_message_buffer)
index bafc0837d2f0e4c2f3a6f37c91220a4c8fa07f86..368d7f81dce8b1b19da81f71e601a7ed7167f8d8 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_sign(context, minor_status, context_handle,
              qop_req, message_buffer, 
              message_token)
index 3449951af32a8ca1a702808e17bb4a18ab040483..f7aa994b116dd9f7a2036e29968f083d419fca52 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_unseal(context, minor_status, context_handle,
                input_message_buffer, output_message_buffer,
                conf_state, qop_state)
index df95d83496f2c76c2e137c3d8bec3bac7315e973..c17d2f5bbc4a9c4a42926a96d6913b4d83ca3bf0 100644 (file)
@@ -23,7 +23,7 @@
 #include "gssapiP_krb5.h"
 #include <memory.h>
 
-krb5_error_code 
+krb5_error_code INTERFACE
 kg_checksum_channel_bindings(cb, cksum, bigend)
      gss_channel_bindings_t cb;
      krb5_checksum *cksum;
index 3b954e9e2186d33b95a79852cb0760f9dc37a3f1..fcb4306ad4c068614fcfe63f0905bc2a5c502225 100644 (file)
@@ -25,7 +25,8 @@
 
 static unsigned char zeros[8] = {0,0,0,0,0,0,0,0};
 
-int kg_confounder_size(ed)
+int INTERFACE
+kg_confounder_size(ed)
      krb5_gss_enc_desc *ed;
 {
    /* XXX Is this an abstraction violation? */
@@ -33,7 +34,7 @@ int kg_confounder_size(ed)
    return(ed->eblock.crypto_entry->block_length);
 }
 
-krb5_error_code
+krb5_error_code INTERFACE
 kg_make_confounder(ed, buf)
      krb5_gss_enc_desc *ed;
      unsigned char *buf;
@@ -43,14 +44,15 @@ kg_make_confounder(ed, buf)
    return(krb5_random_confounder( ed->eblock.crypto_entry->block_length, buf));
 }
 
-int kg_encrypt_size(ed, n)
+int INTERFACE
+kg_encrypt_size(ed, n)
      krb5_gss_enc_desc *ed;
      int n;
 {
    return(krb5_encrypt_size(n, ed->eblock.crypto_entry));
 }
 
-krb5_error_code
+krb5_error_code INTERFACE
 kg_encrypt(ed, iv, in, out, length)
      krb5_gss_enc_desc *ed;
      krb5_pointer iv;
@@ -78,7 +80,7 @@ kg_encrypt(ed, iv, in, out, length)
 
 /* length is the length of the cleartext. */
 
-krb5_error_code
+krb5_error_code INTERFACE
 kg_decrypt(ed, iv, in, out, length)
      krb5_gss_enc_desc *ed;
      krb5_pointer iv;
index 8792b8bd94000fa26484a5ffef87eec55db64b68..318a49b8c7dea01b8926bff1836edf6535f976cc 100644 (file)
@@ -25,7 +25,7 @@
 
 static unsigned char zeros[16] = {0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,0};
 
-krb5_error_code
+krb5_error_code INTERFACE
 kg_make_seed(key, seed)
      krb5_keyblock *key;
      unsigned char *seed;
index 47381f6828826819ada7ce4788e4cbd9caf15a02..a6d6ed597e54470f18aec34b5de3f8b55810c26e 100644 (file)
 
 #include "gssapiP_krb5.h"
 
-krb5_error_code 
+krb5_error_code INTERFACE
 kg_make_seq_num(ed, direction, seqnum, cksum, buf)
      krb5_gss_enc_desc *ed;
      int direction;
-     int seqnum;
+     krb5_int32 seqnum;
      unsigned char *cksum;
      unsigned char *buf;
 {
index 398b1d771728297968aae169fcf7cda00c3d8834..df0316aa8557ff9cd3106ed746b8531e25d29f8d 100644 (file)
@@ -22,7 +22,7 @@
 
 #include "gssapiP_krb5.h"
 
-OM_uint32
+OM_uint32 INTERFACE
 krb5_gss_verify(context, minor_status, context_handle,
                message_buffer, token_buffer,
                qop_state)